AdvancedPersistentThreatSecureEmailSpearPhishingLeastPrivilegeRespondProtectIdentifyFirewallSSLDecryptDataDiscoveryMalwarePhishingAssetManagementSecurePasswordTwo-FactorAuthenticationRiskAssessmentTypesofHackersVPNRecoverAntivirusPatchManagementPassPhaseSecurityAwarenessTrainingDetectAdvancedPersistentThreatSecureEmailSpearPhishingLeastPrivilegeRespondProtectIdentifyFirewallSSLDecryptDataDiscoveryMalwarePhishingAssetManagementSecurePasswordTwo-FactorAuthenticationRiskAssessmentTypesofHackersVPNRecoverAntivirusPatchManagementPassPhaseSecurityAwarenessTrainingDetect

CYBER SECURITY - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Advanced Persistent Threat
  2. Secure Email
  3. Spear Phishing
  4. Least Privilege
  5. Respond
  6. Protect
  7. Identify
  8. Firewall
  9. SSL Decrypt
  10. Data Discovery
  11. Malware
  12. Phishing
  13. Asset Management
  14. Secure Password
  15. Two-Factor Authentication
  16. Risk Assessment
  17. Types of Hackers
  18. VPN
  19. Recover
  20. Antivirus
  21. Patch Management
  22. PassPhase
  23. Security Awareness Training
  24. Detect